The affected Reolink P2P products do not sufficiently protect data transferred between the local device and Reolink servers. This can allow an attacker to access sensitive information, such as camera feeds.
References
Link | Resource |
---|---|
https://us-cert.cisa.gov/ics/advisories/icsa-21-019-02 | Third Party Advisory US Government Resource |
https://us-cert.cisa.gov/ics/advisories/icsa-21-019-02 | Third Party Advisory US Government Resource |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 05:17
Type | Values Removed | Values Added |
---|---|---|
References | () https://us-cert.cisa.gov/ics/advisories/icsa-21-019-02 - Third Party Advisory, US Government Resource |
Information
Published : 2021-01-26 18:15
Updated : 2024-11-21 05:17
NVD link : CVE-2020-25169
Mitre link : CVE-2020-25169
CVE.ORG link : CVE-2020-25169
JSON object : View
Products Affected
reolink
- rlc-422
- rlc-520a_firmware
- rlc-510a
- rlc-423
- rlc-423s_firmware
- rlc-410
- rln8-410
- rlc-520a
- rln8-410_firmware
- rlc-423_firmware
- rlc-510a_firmware
- rlc-410_firmware
- rlc-423s
- rlc-422_firmware
CWE
CWE-319
Cleartext Transmission of Sensitive Information